Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

3 AWS reviews

External reviews

27 reviews
from

External reviews are not included in the AWS star rating for the product.


3-star reviews ( Show all reviews )

    Sandip_Patel

Evaluating robust file monitoring with insights for community support improvements

  • November 22, 2024
  • Review provided by PeerSpot

What is our primary use case?

I am currently evaluating and using Wazuh for file monitoring and compliance reporting. We are in the process of conducting a POC to understand how the rules work. I lead this effort to explore and evaluate Wazuh as part of my learning and work experience.

What is most valuable?

Wazuh's most valuable features include file monitoring and compliance reporting, which do not require excessive costs. These aspects are vital as they provide alerts for changes and facilitate the monitoring of compliance. The platform is also relatively easy to set up and operate. Reports are straightforward to extract and prove useful for compliance requirements.

What needs improvement?

I am investigating more about the community support for Wazuh. I can't provide a definitive answer yet. An issue I noticed is with tag values in certain rules not functioning properly. It's unclear if this is a design flaw or intentional. These are areas I'm still exploring.

For how long have I used the solution?

I have been using Wazuh for about seven months.

What do I think about the scalability of the solution?

Wazuh offers scaling options and is scalable from a mid to advanced level. However, I am still evaluating if it meets enterprise-scale requirements.

How are customer service and support?

The documentation is good and provides clear instructions, though it's targeted at those with technical backgrounds.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

Before Wazuh, we used market products for our needs. We are exploring other options due to Wazuh being open source.

How was the initial setup?

The initial setup of Wazuh was not complex once the requirements were understood. In a POC environment, setting up took about a day and a half.

What about the implementation team?

I am spearheading this POC effort. Once completed, more people will likely be involved.

What was our ROI?

There is high potential for ROI, especially for small to medium businesses comparing Wazuh to market solutions. Wazuh offers more cost-effective options without compromising on security.

What's my experience with pricing, setup cost, and licensing?

Since Wazuh is open source, the pricing for support could be applicable to medium-sized companies without much issue. However, I haven't fully explored what comes with this pricing.

Which other solutions did I evaluate?

We have looked into the Elastic Stack and haven't explored integrating it with Wazuh since Elastic Stack is no longer open source.

What other advice do I have?

I would recommend Wazuh. It's a valuable tool for security operations. On a scale of one to ten, I currently rate Wazuh as a six. I may rate it higher after more experience.

Which deployment model are you using for this solution?

On-premises


    reviewer2590542

Improved security visibility but needs better support and integration

  • November 04, 2024
  • Review provided by PeerSpot

What is our primary use case?

Our primary use case was around data collection and anomaly detection. We integrated Wazuh with Google Cloud and other cloud providers to receive alerts and insights if there is any unauthorized data access in the production environment. 

We also monitor virtual machines for any malicious command execution and get notifications for any privilege access attempts. Additionally, we detect anomalies in traffic patterns related to specific client accounts.

How has it helped my organization?

Wazuh has provided us with excellent clarity on data access, allowing us to significantly reduce instances of unnecessary production environment access and improve processes. 

We now have real-time visibility into the production environment on both cloud and critical virtual machines, which was not possible with our previous manual audits.

What is most valuable?

We found the MITRE framework mapping and the agent enrollment service to be the most valuable features of Wazuh. These components are essential for our security needs.

What needs improvement?

The support channel is not optimal, and extensive research is required on our part to implement Wazuh effectively. The integration modules are insufficiently developed, necessitating the creation of custom integration solutions using tools like Logstash and PubSub. Although they offer data fetching from Cloud Bucket as a more economical option, it was not functioning properly.

For how long have I used the solution?

I've used the solution for four months, during which it was effectively deployed in our production environment for approximately 45 days.

What do I think about the stability of the solution?

The stability of Wazuh is strong, with no issues stemming from the solution itself. Any downtime we experienced was due to human error in configuration.

What do I think about the scalability of the solution?

Scalability depends on the configuration and the infrastructure resources like compute and memory we allocate. We found scalability to be decent, as we could easily adjust our infrastructure to handle increased traffic.

How are customer service and support?

We use the open-source version of Wazuh, which does not provide paid support. Although the community is active, it is not highly responsive. Conversion from issue to resolution is average.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

Before Wazuh, we relied on periodic audits, which were time-consuming and did not provide automated detection of security anomalies.

How was the initial setup?

Initial setup was incredibly simple, requiring only the running of one script for a single node setup. Complexities arose during integration with Kubernetes-based workloads due to insufficient documentation.

What about the implementation team?

We required only two people for both the deployment and ongoing maintenance of Wazuh.

What was our ROI?

The return on investment is visible in reduced mean time to detect from potentially three months to about an hour and mean time to respond from up to thirty days to two days.

What's my experience with pricing, setup cost, and licensing?

We did not incur costs for Wazuh itself, only for the underlying infrastructure such as PubSub, storage, and compute instances, totaling around two lakh Indian rupees per month.

Which other solutions did I evaluate?

We evaluated Google Chronicle and Elastic-based SIEM (ELK SIEM), but Wazuh was the most cost-effective solution, being open-source with necessary compute infrastructure.

What other advice do I have?

Wazuh is well-suited for small to medium-sized organizations seeking better data and security visibility for a reasonable investment. There is a learning curve due to less comprehensive documentation, but it is a beautifully designed solution.

I'd rate the solution seven out of ten.

Which deployment model are you using for this solution?

On-premises


    PubuduWijerathne

Enables us to monitor server changes like password changes and account privilege changes

  • July 01, 2024
  • Review provided by PeerSpot

What is our primary use case?

We recommend and assist our clients using Wazuh for semi-custom solutions for critical sectors like telecommunication, healthcare, government, or military. Wazuh helps them solve critical in a limited time. Their operations are already digital, but I haven't worked with highly critical customers. 

My customers mainly use Wazuh for threat detection in industries with mostly Windows servers. We monitor server changes like password changes and account privilege changes. Wazuh makes it easy to track these changes without needing to check the domain controller. We open the Wazuh interface to see all the details. That's why I love Wazuh, though I get nervous too.

What is most valuable?

Regarding Wazuh, I find the SCA (Security Configuration Assessment) features most valuable. It's crucial for asset management and inventory, allowing us to monitorendpoints and servers' changes easily. This is particularly important for my customers, who aren't heavily focused on incident response but rely on asset management and inventories.

Wazuh's compliance management features are very supportive, especially in regions like the Americas and Europe. However, it's less effective in the ANZ (Australia and New Zealand) region since Wazuh doesn't cater to the specific compliance standards there, such as those required in Australia. I appreciate that Wazuh fully complies with PCI DSS and GDPR standards, allowing us to generate necessary reports.

What needs improvement?

I want more support for regional compliance standards to serve my ANZ region customers better.

For how long have I used the solution?

I have been using Wazuh for the past three years.

What do I think about the stability of the solution?

Regarding stability, I would rate it a seven out of ten. It needs improvements, especially compared to products like IBM QRadar and other cloud-based solutions.

What do I think about the scalability of the solution?

I rate the scalability of Wazuh as a four out of ten. While my customers are generally satisfied and do not have highly critical requirements, I see areas for improvement as a technical person.

How are customer service and support?

The technical support for Wazuh's licensed products is decent. Sometimes, there are delayed response and resolution times, which can be frustrating. 

Wazuh is deployed on the cloud and on-premises in our customers' organisations. Deploying Wazuh depends on the customer's requirements; smaller customers take less time, but complex needs can extend the process. Typically, deployment is completed within a month.

How would you rate customer service and support?

Neutral

How was the initial setup?

The initial setup was somewhat challenging for us, especially when we tried to do it independently. We faced some implementation issues but found solutions indicating ongoing product improvements. Sometimes, we face compatibility issues with certain industry products, requiring custom solutions, which can be a bit of a headache. However, we've managed to address these challenges over time. I would rate the setup process a five out of ten.

Wazuh is deployed on the cloud and on-premises in our customers' organisations. Deploying Wazuh depends on the customer's requirements; smaller customers take less time, but complex needs can extend the process. Typically, deployment is completed within a month.

What other advice do I have?

Overall, I would rate Wazuh as seven out of ten.


    Access UI issue

Access UI issue

  • June 11, 2024
  • Review from a verified AWS customer

Can't access to the UI with the credencials u provide after installing the "Wazuh All-In-One Deployment". The instruction guide is not updated i guess


    reviewer2301372

Has efficient integration features, but they could provide enhanced customization capabilities

  • February 09, 2024
  • Review provided by PeerSpot

What is our primary use case?

We use Wazuh to deliver security features in a venture capital company project focused on building a mobile application.

What needs improvement?

They could include flexibility and customization capabilities by modifying for customers based on partner agreements. They could enhance governance-related tools for audit reports.

We conducted a cost-benefit evaluation and compared Wazuh with Sentinel and FortiCM. The decision to choose Wazuh was influenced by its compatibility with other systems and the strong open-source community.

In comparison, Microsoft has a huge community, but it needs to be easy to use. Additionally, FortiCM needs better community support.

For how long have I used the solution?

We are the latest version of Wazuh.

What do I think about the stability of the solution?

We have not encountered any performance issues for the application up until now. I rate the stability an eight out of ten.

What do I think about the scalability of the solution?

The product is easily scalable. We have around 20 executives using it daily. Our work on the use cases is still in progress.

How are customer service and support?

We contact a third-party supplier for technical support. They provide seamless services and resolve issues by the next day most of the time.

Which solution did I use previously and why did I switch?

I was a part of a service team using Splunk. I have experience working with Symantec Endpoint.

How was the initial setup?

I rate the initial setup process a seven out of ten.

What about the implementation team?

The implementation of Wazuh is done through a local third-party supplier, but the management and overall engagement with the company are handled in-house. The third-party supplier provides hardware provision, field engineers, and devices, with the day-to-day management and operations handled remotely.

There were some slight problems related to the images being used. However, these issues were attributed to infrastructure considerations rather than specific to Wazuh. Once the correct image was selected, the installation process for the first server during the proof of concept, which involved comparing Sentinel and other solutions, was completed relatively quickly—approximately one day.

It might require a team for regular patch management and vulnerability scanning. We have yet to start with the maintenance.

What's my experience with pricing, setup cost, and licensing?

For both personal and service use, the perceived cost is relatively low. They have a good pricing strategy for market expansion.

I rate the product's pricing a three out of ten.

Which other solutions did I evaluate?

We evaluated Sentinel.

What other advice do I have?

We are currently running a proof of concept and simulating usage with a select group of users as required by local bank licensing. It is utilized for vulnerability management. Up to this point, there have been minor incidents with no risks higher than moderate. Despite not needing immediate reaction, we have automation in place within your SOC and development team to respond in case of any recognized incidents.

One of the most beneficial features of Wazuh, particularly in the context of security needs, is the machine learning data handling capability. Although it has yet to be fully implemented into production and is currently in a test environment, the decision to choose Wazuh was influenced significantly by this feature. It helps us streamline and automate the assessment of security incidents. We can organize response plans proactively, even before certain incidents occur. It is the most critical aspect for us.

There were initial challenges with the real-time alerting team due to the many systems-generated alerts. It took about three months to fine-tune the system configuration, focusing on capturing only the alarms relevant from a security perspective. Despite the initial difficulties, Wazuh worked seamlessly, and there were no notable issues with configurations, handling, or investigations. The challenges primarily occurred from system-related aspects rather than issues with Wazuh.

I do not have direct experience with scalability requirements, but the implementation has been seamless. No challenges are scaling up, especially regarding adding more machines to handle the same load. The challenge is delivering logs so that Wazuh can collect, read, and analyze them effectively. We were able to overcome major issues without the need for extensive support.

Wazuh has been integrated with an intrusion prevention system (IPS) solution, Suricata, also an open-source tool. This integration adds a layer for security monitoring. The integration process is quite straightforward, especially due to the community's availability of shared use cases.

I rate the product a seven out of ten.

Which deployment model are you using for this solution?

On-premises


    Idris Aliyu

Easy to deploy in many environments, but it needs to strengthen key features like threat intelligence

  • October 20, 2023
  • Review provided by PeerSpot

What is our primary use case?

Wazuh is very good. It offers the ability to measure and benchmark your environment to one of the standards. We installed it on the customer's premises and benchmarked it against CIS controls. We are not in a big environment, and we haven't tested Wazuh for long.

What is most valuable?

The main thing I like about it is that it has an EDR. Other than that, I like that it allows us to benchmark against the standard. It even suggests ways to improve things. Wazuh helps us to research how we can meet the benchmark.

What I also like about Wazuh is that you can deploy the agents in Linux and Unix environments, such as HP, IBM, and Oracle servers. Those servers use UX and AIX environments. The solution has Solaris agents, too. It has agents for all platforms.

What needs improvement?

I have yet to find the same capability in Wazuh to get logs from different sources into the system. I haven't been able to explore that.

There are many functions I want to add. For example, I want to get feeds from different places through threat intelligence. If the feature is there, it needs to be matured. Threat intelligence is key to the use case I've deployed the solution for. It would be good if Wazuh correlated it with the internal and external feeds. Integrating Wazuh with other platforms is a key aspect.

For how long have I used the solution?

I recently started using Wazuh. It's been about two months.

What do I think about the stability of the solution?

I rate Wazuh's stability a seven out of ten. It's stable. It's been working so far, and I have no reason to complain.

What do I think about the scalability of the solution?

We have 20 endpoints on Wazuh and two or three administrators for now managing the solution.

Which solution did I use previously and why did I switch?

I used an old SIEM before Wazuh. Wazuh is more stable. I preferred Wazuh because it's open source. The old SIEM is closing in on the product, though.

How was the initial setup?

The initial setup is really simple. It took three hours to deploy Wazuh.

What about the implementation team?

I implemented Wazuh myself since I'm an experienced administrator.

What's my experience with pricing, setup cost, and licensing?

We use the free version of Wazuh. We will eventually move on to the commercial version.

Which other solutions did I evaluate?

I did some research, but I didn't test. The research was based on user opinions. I saw that most people have tested Wazuh. You can easily get resources online to help you to use the product. Wazuh is getting more popular. If you have a problem, you are not on your own.

Another solution we evaluated was Security Onion, but it was based on a platform that may be at the end of its life, which is Linux Red Hat. Linux Red Hat seems to be on shaky ground, and we don't know where it's headed. We wanted something that provides a roadmap that is not ending soon.

What other advice do I have?

We're still in a test phase with Wazuh. I'm testing integration with the tools that other tools that we are using in a clustered environment. We can adapt the solution on the way forward.

I rate Wazuh a seven out of ten.

Which deployment model are you using for this solution?

On-premises


    Chetan_Sharma

Has good scalability but requires an efficient hardware monitoring tool

  • July 03, 2023
  • Review provided by PeerSpot

What is our primary use case?

We use the solution for vulnerability metrics, auditing, and detecting SQL injection attacks.

What is most valuable?

The solution's most valuable feature is its SCA capabilities.

What needs improvement?

There could be a hardware monitoring tool for the solution. It helps reduce the cost of utilizing external resources for the same.

For how long have I used the solution?

We have been using the solution for five to six months.

What do I think about the scalability of the solution?

I rate the solution's scalability a ten out of ten. We have enterprise business clients.

How are customer service and support?

We are currently evaluating the cost of the solution's support services.

How was the initial setup?

We have multiple teams using the solution in the virtual environment. It was easy to deploy for a few teams while challenging for others.

What's my experience with pricing, setup cost, and licensing?

I rate the solution's pricing a seven out of ten.

What other advice do I have?

I rate the solution a seven out of ten. There needs to be monitoring for the hardware similar to Zabbix and Nagios solutions.

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure


    Youssef EL AZZOUZI

Provides a range of features, but its configuration process needs to be faster

  • May 09, 2023
  • Review provided by PeerSpot

What is our primary use case?

We use the solution for endpoint detection and response. It helps us detect malicious files.

What is most valuable?

The solution is easy to integrate with other SOC tools. Also, it has a lot of capabilities like active response, cloud security, etc.

What needs improvement?

The solution's configuration could be faster.

For how long have I used the solution?

We have been using the solution for two months.

What do I think about the stability of the solution?

The solution is easy to install. However, it takes a long time to configure.

What do I think about the scalability of the solution?

It is a stable solution.

What's my experience with pricing, setup cost, and licensing?

It is an open-source solution.

What other advice do I have?

I recommend the solution to others and rate it a seven. It has many features and integrates with other substitutes like QRadar, Hive, etc.


showing 1 - 8